Search Results - (( data estimation path algorithm ) OR ( data detection method algorithm ))
Search alternatives:
- method algorithm »
- data estimation »
- estimation path »
- path algorithm »
- data detection »
-
1
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…In conclusion, the proposed method is capable of mitigating the NLOS path effect on both indoor positioning and data networking systems.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
3
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
4
Totally opportunistic routing algorithm for underwater wireless sensor network
Published 2019“…Whereas in NA-TORA, Expected Transmission Count (ETX) and residual energy of a node are considered for data transmission to ensure packet delivery. The suggested data forwarding algorithms are designed to abstain horizontal transmission, to lower end to end delay and improve throughput and energy efficiency. …”
Get full text
Get full text
Thesis -
5
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
Get full text
Get full text
Thesis -
6
Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles
Published 2025“…This study investigates the physical calibration of a LiDAR sensor mounted on a moving vehicle and its effect on 3D map generation using the HDL Graph SLAM algorithm. HDL Graph SLAM was selected as the offline post-processing method due to its self-correcting functions for estimating and auto-correcting positional errors from LiDAR data. …”
Get full text
Get full text
Get full text
Article -
7
Peramalan Isyarat Satelit Menggunakan Kaedah Rangkaian Neural
Published 2006“…This project has produced a neural network system that achieves 91.7% accuracy through the use of Bayesian Regularization algorithm. Thus, we can say that the system is able to make an accurate and convincing estimation. …”
Get full text
Get full text
Monograph -
8
Intruder localization wireless sensor network radar design with virtual reference tags
Published 2014“…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks
Published 2015“…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
Get full text
Get full text
Conference or Workshop Item -
10
Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks
Published 2015“…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of mapping methods for seagrass meadows in Malaysia by using landsat images
Published 2015“…A statistical assessment and an evaluation of the twelve SLC-off and four SLCon images covering seagrass meadows of Sungai Pulai estuary, Johor, Malaysia were conducted for data loss estimates. This analysis revealed a 2% systematic error attributable to a gradual increase of SLC-off stripes from the central nadir path towards the edge of the scene. …”
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
13
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
Get full text
Get full text
Article -
14
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
18
A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab
Published 2009“…Pathload has been chosen as a measurement tool that estimates the available bandwidth of a network path.…”
Get full text
Get full text
Thesis -
19
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The proposed model serves as path-independent fatigue life estimating tool hence can be used with any type of loading conditions. …”
Get full text
Get full text
Thesis -
20
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis
